dblp.uni-trier.dewww.uni-trier.de

Zuhua Shao

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEZuhua Shao: Fair exchange protocol of signatures based on aggregate signatures. Computer Communications 31(10): 1961-1969 (2008)
18EEZuhua Shao: Certificate-based fair exchange protocol of signatures from pairings. Computer Networks 52(16): 3075-3084 (2008)
17EEZuhua Shao: Certificate-based verifiably encrypted signatures from pairings. Inf. Sci. 178(10): 2360-2373 (2008)
2007
16EEZuhua Shao: On the Sequentiality of Three Optimal Structured Multisignature Schemes. ISPEC 2007: 105-115
15EEZuhua Shao: Self-certified Signatures Based on Discrete Logarithms. WAIFI 2007: 252-263
14EEZuhua Shao: A provably secure short signature scheme based on discrete logarithms. Inf. Sci. 177(23): 5432-5440 (2007)
13EEZuhua Shao: Self-certified signature scheme from pairings. Journal of Systems and Software 80(3): 388-395 (2007)
2006
12EEZuhua Shao: Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys. Informatica, Lith. Acad. Sci. 17(4): 577-586 (2006)
11EEZuhua Shao: Security of the design of time-stamped signatures. J. Comput. Syst. Sci. 72(4): 690-705 (2006)
2005
10EEZuhua Shao: Enhanced Aggregate Signatures from Pairings. CISC 2005: 140-149
9EEZuhua Shao: Short Signature Scheme Based on Discrete Logarithms. WAIM 2005: 645-650
8EEZuhua Shao: A new key authentication scheme for cryptosystems based on discrete logarithms. Applied Mathematics and Computation 167(1): 143-152 (2005)
7EEZuhua Shao: Improvement of efficient proxy signature schemes using self-certified public keys. Applied Mathematics and Computation 168(1): 222-234 (2005)
6EEZuhua Shao: Security of meta-He digital signature scheme based on factoring and discrete logarithms. Applied Mathematics and Computation 170(2): 976-984 (2005)
5EEZuhua Shao: Cryptanalysis of Xia-You group signature scheme. Journal of Systems and Software 75(1-2): 89-94 (2005)
2004
4EEZuhua Shao: Improvement of digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation 159(2): 391-399 (2004)
2003
3EEZuhua Shao: Proxy signature schemes based on factoring. Inf. Process. Lett. 85(3): 137-143 (2003)
2EEZuhua Shao: Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers". Inf. Process. Lett. 86(6): 295-298 (2003)
2001
1EEZuhua Shao: Batch verifying multiple DSA-type digital signatures. Computer Networks 37(3/4): 383-389 (2001)

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)